Tag Archives: attacks

The level of cybercrimes castigated by dark web and cryptocurrencies in India has experienced a sharp rise in recent years. There is no doubt that the government is doing all in its capacity to fight the cybercrimes at all cost. The Indian government is working with the Intelligence Bureau to amend the Information Technology Act, in order to deal more ... Read More »

DDoS attacks lead to the most devastating effects within a network. DDoS attacks are forms of congestion-control problems, and because most forms of such congestion are secondary to the effects of malicious hosts not following conventional end-to-end congestion control, the problem must be solved by routers. Designing a mechanism to counteract unidentified attacks targeting the application and transport layer represents ... Read More »

Flow correlation represents one of the essential techniques utilized in a myriad of deanonymization attacks launched against Tor. Even though flow correlation attacks are highly important , current flow correlation techniques are ineffective in linking Tor traffic flows when implemented at a large scale, i.e. they require long flow observation rates that are highly impractical, or are associated with high ... Read More »

With an average of around two million daily users, along with approximately 7,000 relay nodes, Tor represents the most popularly used anonymity system that evolved from a mere scientific concept to a tool used every day in the real world. Tor is designed to protect the privacy of users online via separating the origin of each connection from its destination ... Read More »

The man who helped expose the NSA’s warrantless global mass surveillance programs is now helping users protect their hardware from physical tampering by attackers. NSA whistleblower Edward Snowden has helped create a new Android app which helps secure hardware from “Evil Maid” attacks. An Evil Maid attack is when a device is physically tampered with, without the device owner’s knowledge. ... Read More »

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

A study by Google discovered that phishing attacks through fake emails were as effective as compared to data breaches that exposed usernames and passwords. Cyber criminals or cyber groups manage to steal over 25,000 valid sets of web credentials for Gmail accounts every week, painting a picture of the extent this problem has reached. Hackers are constantly searching for, and ... Read More »

In an October public service announcement, the FBI explained “DDoS-for-hire” services and requested that victims of DDoS attacks file a complaint with the FBI’s Internet Crime Complaint Center (IC3). They explained that malicious actors sell DDoS-for-hire services (aka booters) on criminal marketplaces with effectively one goal: preventing access to a “U.S. company or government website.” In an earlier press release, ... Read More »

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »

A new code of practice has been launched by the UK government aimed at helping ship owners improve and tighten security. This decision came as a result of the growing threat that cybercrime poses as it continues to spread and this time around to a much more bewildering place, the shipping sector. The term ‘cybercrime’ to most people, just gives ... Read More »

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

The San Jose headquartered cyber security company ThreatMetrix released its report for the second quarter of 2017. The study showed that cyber attacks reached their highest-ever levels. According to ThreatMetrix’s study, the cyber security detected 144 million attacks in the last 90 days, which is an all-time high. The level and the rate of attacks are rising globally with the ... Read More »

A new type of PDF phishing attack has emerged, with analysts claiming that the attack originated from Western Africa based on the IP addresses evaluated during previous investigations. The attack embeds phishing URLs to the attached PDF that redirect users to a phishing platform that steal user credentials. According to Silicon, dark web security specialists Flashpoint first discovered and investigated ... Read More »

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »